Linux Tutorials on the topic “security”

There aren't many viruses made for Linux distributions and as such, most people who use such systems don't ever bother using an antivirus software. Those however who do want to be able to scan their system or other windows-based systems that are connected on a Linux PC through a network, they can use ClamAV. ClamAV is an open source anti-virus engine that is built to detect viruses, trojans, malware and other threats. It supports multiple file formats (documents, executables or archives), utilizes multi-thread scanner features and receives updates for its signature database at least 3-4 times a day.

Documents safety is a particularly sensitive matter due to the typical usage nature and possible value and importance of the contents. That said, users should be extra careful when sharing documents that shouldn't be leaked to other parties.

This tutorial shows you how to protect ownCloud logins with two factor authentication by using privacyIDEA to manage the second authentication factor. privacyIDEA is a system to manage authentication devices for two factor authentication in your own network - not at any Identity Provider - thus keeping your identity and the identities of your users also under your control.

SSH (Secure Shell) is a cryptographic network protocol for initiating text-based shell sessions on remote machines in a secure way. OpenSSH is a connectivity tool that most administrators rely on to work on their Linux and *BSD servers daily. This tutorial covers the best pratices to configure your SSH server securely.

SSHFS is a handy tool to share files securely. It is a filesystem based on the SSH File Transfer Protocol. In this tutorial we will see how to install SSHFS with from the CentOS repository with the yum command and also how to compile it from source.

SSH access is always critical and you might want to find ways to improve the security of your SSH login. In this article we will see how we can secure SSH with simple two factor authentication by using Google Authenticator. Before using it you have to integrate the SSH daemon on your server with Google Authenticator one time password protocol TOTP and another restriction is that you must have your android phone with you all the time or at least the time you want SSH access. This tutorials is written for CentOS 7.

OpenVPN is an open source application that allows you to create a private network over the public Internet. OpenVPN tunnels your network connection securely trough the internet. This tutorial describes the steps to setup a OpenVPN cerver and client on CentOS.

TrueCrypt is no more, and the purpose of this post is to show you straightforward partition encryption with dm-crypt luks.
DM-Crypt is transparent drive encryption that is kernel module and part of the device mapper framework for mapping physical block device onto higher-level virtual block devices, it uses cryptographic routines from the kernel's crypto api. Long story short, device mapping encryption provided by the kernel "linux" crypto api.

Encryption is the process of encoding messages or information in such a way that only authorized parties can read them. With almost no privacy in this digital generation of our's, encryption of our data is one of the most required tools. Most of the applications like gmail encrypt our data, but the data on your system is still unsecured and there are hackers or unauthorised users waiting to access them. One way to minimize the risk of data theft is to encrypt the data that is present even on our local system.
This tutorial demonstrates several methods of encrypting the data on Linux systems using commandline tools.